Managing Information Security by John R. Vacca | Paperback | Barnes & Noble
Managing Information Security

Managing Information Security

5.0 1
by John R. Vacca
     
 

ISBN-10: 1597495336

ISBN-13: 9781597495332

Pub. Date: 03/29/2010

Publisher: Elsevier Science

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the

Overview

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.

  • Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else
  • Comprehensive coverage by leading experts allows the reader to put current technologies to work
  • Presents methods of analysis and problem-solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions

Product Details

ISBN-13:
9781597495332
Publisher:
Elsevier Science
Publication date:
03/29/2010
Pages:
320
Product dimensions:
7.50(w) x 9.10(h) x 1.00(d)

Table of Contents

Ch 1 Information Security Essentials for IT Managers

Ch 2 Security Management Systems

Ch 3 Information Technology Security Management

Ch 4 Identity Management

Ch 5 Intrusion Prevention and Detection Systems

Ch 6 Computer Forensics

Ch 7 Network Forensics

Ch 8 Firewalls

Ch 9 Penetrating Testing

Ch 10 What is Vulnerability Assessment?

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >